Search
Close this search box.

What’s Cooking in Network Security Technology

Software Defined Security

Software-Defined Security (SDS) One of the dozens of buzzwords making the rounds, software-defined security is an umbrella term for several related security approaches and solutions. Touted by enthusiasts as the “new wave of network security,” Software Defined Security is a flexible and increasingly popular way to secure data centers, workloads, and containers. Software Defined Security […]

Firewalls: Traditional, Next-Gen and Never Again

VoIP Firewall Security

Firewalls—they’re pretty boring, right? How many times have you yawned at the mention of these essential but unexciting devices? That might have been true in the past. But, did you know that even next-gen firewalls are subject to hype and might be on the road to extinction? Hackers, Firewalls and AI For many IT admins and developers, […]

Cracking the Code of VoIP Encryption

Encryption for VoIP

Welcome to another foray into VoIP-related technology and the hype that surrounds it. This time, we’re reviewing end-to-end encryption of phone calls, messages, video and audio VoIP content—what encryption is, how it works and who needs it. Different Levels of VoIP Security VoIP communications (phone calls, video and messaging) are being widely adopted to provide […]

Some TI Requirements You Might Have Overlooked

Threat Intelligence

Threat Intelligence and Security Does your business want to set up or improve its threat intelligence security operations? If you find it more complicated than you thought, you have plenty of company. Many companies wanting to benefit from Threat Intelligence are learning a hard truth: setting up successful TI operations takes a lot more than subscribing […]

8 Ways to Avoid Threat Intelligence Disappointment

Cyber security

More than 35 years ago, when biotech was young, the trade press bombarded readers with a litany of praise about the newest biological drugs, processes and medical treatments that biotech would bring to pass. As usual with high-tech product announcements, some of this verbiage was based on hope, not evidence. Long before Gartner established its […]

How to Protect Your Business from the Top VoIP Security Threats

VoIP Security

The VoIP Effect in Business When Voice over IP first emerged, there was little consideration given to security matters, with most users focusing on cost, reliability, and features. But now that VoIP has gained mainstream acceptance, security has become a critical concern. This is especially relevant as VoIP rapidly takes over from one of the world’s most […]